Show/hide contentOpenClose All
Curricular information is subject to change
- Identify key security concepts and threats to software systems;
- Distinguish the most common classes of vulnerabilities in software projects;
- Select countermeasures that could be applied to mitigate vulnerabilities;
- Identify and exploit security vulnerabilities in software projects;
- Develop patches to remove vulnerabilities from existing software projects;
- Work in teams, share work fairly and meet the obligations set by the group;
- Be curious about latest security vulnerabilities and patches;
- Actively Promote security practices
Modules Recommended:
- Introduction to Computer Forensics (COMP20130)
- Networks and Internet Systems (COMP30040)
- Distributed Systems (COMP30220)
- Web application development using Spring Boot
- OWASP Top 10 Vulnerabilities for each vulnerability exploit examples will be demonstrated
- Vulnerability mitigation strategies will also be showcased in practice using Spring Security
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Total | 24 |
Not applicable to this module.
Description | Timing | Component Scale | % of Final Grade | ||
---|---|---|---|---|---|
Group Project: Each group will improve the web application developed in Assignment 1 to remove the vulnerabilities identified in the previous assignment. | Coursework (End of Trimester) | n/a | Graded | Yes | 40 |
Group Project: Implementation of a web application simulating a simplified hotel management system | Week 5 | n/a | Graded | Yes | 20 |
Group Project: Creation of exploits that will exercise the vulnerabilities of the web application developed by another group. | Week 10 | n/a | Graded | Yes | 40 |
Remediation Type | Remediation Timing |
---|---|
In-Module Resit | Prior to relevant Programme Exam Board |
• Feedback individually to students, post-assessment
• Group/class feedback, post-assessment
• Peer review activities
The lecturer will provide a variety of feedback strategies. The lecturer will provide students examples of exploits and strategies to prevent vulnerabilities that the students are are required to apply in their group projects. At the end of each group project, the lecturer will provide written feedback to each group using an instructional rubric. The second group project will be peer-reviewed by a different group of students who will provide written feedback following a given set of assessment criteria.